Annotation of embedaddon/strongswan/testing/tests/ikev2/ocsp-strict-ifuri/description.txt, revision 1.1.1.1
1.1 misho 1: This scenario tests the <b>strictcrlpolicy=ifuri</b> option which enforces a
2: strict CRL policy for a given CA if at least one OCSP or CRL URI is known
3: for this CA at the time of the certificate trust path verification.
4: On the gateway <b>moon</b> two different Intermediate CAs control the access
5: to the hosts <b>alice</b> and <b>venus</b>. Access to <b>alice</b> is granted
6: to users presenting a certificate issued by the Research CA whereas <b>venus</b>
7: can only be reached with a certificate issued by the Sales CA.
8: <p>
9: The roadwarrior <b>carol</b> has a certificate from the Research CA which does not
10: contain any URIs. Therefore a strict CRL policy is <b>not</b> enforced and the
11: connection setup succeeds, although the certificate status is unknown.
12: </p>
13: <p>
14: The roadwarrior <b>dave</b> has a certificate from the Sales CA which contains
15: a single OCSP URI but which is not resolvable. Thus because of the known URI
16: a strict CRL policy is enforced and the unknown certificate status causes the
17: connection setup to fail.
18: </p>
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>